Description
Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.
CVSS Metrics
- Vector
- CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N
- Attack Vector
- physical
- Complexity
- high
- Privileges
- high
- User Action
- required
- Scope
- changed
- Confidentiality
- low
- Integrity
- none
- Availability
- none
- Weaknesses
- CWE-312
Metadata
- Primary Vendor
- NEXTCLOUD
- Published
- 11/15/2024
- Last Modified
- 1/23/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
nextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_server
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.